Disney Research has recently revealed research into tech that could power a mobile phone as soon as it enters a room.
They call it “Quasistatic Cavity Resonance for Ubiquitous Wireless Power Transfer,” which is a long way of saying we are on our way to cutting our need for power cords.
Computer vision, sensors, and more…here’s what a smart store looks like when implemented by Amazon.
Google (GOOGL, Tech30) unveiled a new 55-inch digital whiteboard on wheels that is intended to “redefine meetings,” or at least help Google gain footing in the workplace.The product, called Jamboard, lets teams pull up documents and presentations on screen from Google’s suite of productivity tools like Docs and Drive. Likewise, whatever you write or draw on the giant touchscreen can then be backed up online.
This is a crazy story about custom hardware designed to allow for card game cheating, including not only poker but nearly any other card game. Custom hardware made to look like a cell phone plus IR marked cards equals total knowledge about what’s happening on the table.
Upon ordering the poker cheating device I kinda expected, based on the screenshots I had seen early on, to get a dedicated piece of hardware that kinda looked like a fake phone. However, to my surprise, the device, showcased in the picture above, far exceeded my expectations by being a fully functional phone with extra hardware dedicated to cheating. Also to my surprise, the device not only allows to cheat at Poker but to cheat at almost any kind of card games you can think of.
The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.
I cannot fully express how this video makes me feel. I want this to happen so, so badly.
This is a fantastic article that illustrates one reason I’ve been so fascinated by hardware over the last few years.
The cheap and easy gains of the last fifty years of Moore’s Law gave birth to a global technology industry. The next little while – somewhere between twenty and fifty years out – will be dominated by a transition from software into hardware, a confusion of the two so complete it will literally become impossible to know where the boundary between the two lies.
Get used to this, because here’s the future of computer security….
A giant botnet made up of hijacked internet-connected things like cameras, lightbulbs, and thermostats has launched the largest DDoS attack ever against a top security blogger, an attack so big Akamai had to cancel his account because defending it ate up too many resources.
Amazon is unveiling an all-new, second-generation Dot today that’s priced at just $49.99. Just like the previous Dot, you can use the tiny puck-like device to add the Alexa voice assistant to existing speakers. Amazon is releasing the new Echo Dot in both black and white, with a more powerful, completely redesigned voice processor.
The hackers would provide data proving the medical devices were life-threatening, with Block taking a short position against St. Jude. The hackers’ fee for the information increases as the price of St. Jude’s shares fall, meaning both Muddy Waters and MedSec stand to profit. If the bet doesn’t work, and the shares don’t fall, MedSec could lose money, taking into account their upfront costs, including research.